Analysis
-
max time kernel
128s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-02-2023 00:44
Static task
static1
Behavioral task
behavioral1
Sample
file (1).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file (1).exe
Resource
win10v2004-20230220-en
General
-
Target
file (1).exe
-
Size
1.5MB
-
MD5
a6a0f7c173094f8dafef996157751ecf
-
SHA1
c0dcae7c4c80be25661d22400466b4ea074fc580
-
SHA256
b055fee85472921575071464a97a79540e489c1c3a14b9bdfbdbab60e17f36e4
-
SHA512
965d43f06d104bf6707513c459f18aaf8b049f4a043643d720b184ed9f1bb6c929309c51c3991d5aaff7b9d87031a7248ee3274896521abe955d0e49f901ac94
-
SSDEEP
24576:mGIyixBMj+/A2d+UKnvT+LwZWj7iDDVVYrz0rbzGTw3DoA/sk6smE:mGbj+/BpKnvyIxVV/XDoAfmE
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
file (1).exepid process 1736 file (1).exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
file (1).exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" file (1).exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
file (1).exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\th.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt file (1).exe File created C:\Program Files\7-Zip\Lang\tk.txt file (1).exe File opened for modification C:\Program Files\7-Zip\7z.dll file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt file (1).exe File opened for modification C:\Program Files\7-Zip\7-zip.dll file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt file (1).exe File opened for modification C:\Program Files\7-Zip\History.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt file (1).exe File created C:\Program Files\7-Zip\Lang\sw.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt file (1).exe File opened for modification C:\Program Files\7-Zip\7z.exe file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt file (1).exe File opened for modification C:\Program Files\7-Zip\readme.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt file (1).exe File opened for modification C:\Program Files\7-Zip\License.txt file (1).exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx file (1).exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt file (1).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
Processes:
file (1).exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" file (1).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" file (1).exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip file (1).exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
file (1).exepid process 1736 file (1).exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2